Vulnerability Description
A weakness has been identified in Open5GS up to 2.7.6. This issue affects the function sgwc_s5c_handle_create_session_response of the component SGW-C. Executing a manipulation can lead to memory corruption. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open5Gs | Open5Gs | <= 2.7.6 |
Related Weaknesses (CWE)
References
- https://github.com/open5gs/open5gs/Product
- https://github.com/open5gs/open5gs/issues/4282ExploitIssue TrackingVendor Advisory
- https://github.com/open5gs/open5gs/issues/4282#issue-3807902188ExploitIssue TrackingVendor Advisory
- https://vuldb.com/?ctiid.346109Permissions RequiredVDB Entry
- https://vuldb.com/?id.346109Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.738334Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-2521?
CVE-2026-2521 is a vulnerability with a CVSS score of 5.3 (MEDIUM). A weakness has been identified in Open5GS up to 2.7.6. This issue affects the function sgwc_s5c_handle_create_session_response of the component SGW-C. Executing a manipulation can lead to memory corru...
How severe is CVE-2026-2521?
CVE-2026-2521 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-2521?
Check the references section above for vendor advisories and patch information. Affected products include: Open5Gs Open5Gs.